This extract from the NSA’s Special Source Operations division’s weekly memo describes the operation of SCALAWAG, the SIGAD (or collection address) associated with the MYSTIC collection of bulk telephony data: see the Washington Post article NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls, 18 March 2014.

﻿(U) Tasking of SCALAWAG
(TS//SI//REL TO USA, FVEY) SCALAWAG/US-3310BG has long since
reached the point where it was collecting and sending home far more
than the bandwidth could handle. Over ...

This undated NSA technical document describes how to configure XKeyScore to send search results to NUCLEON, the agency’s database for voice data: see the Intercept article XKEYSCORE: NSA’s Google for the World’s Private Communications, 1 July 2015.

This undated NSA presentation from the agency’s Information Technology Directorate, aimed at analysts, describes techniques for decrypting IPSec VPN traffic: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.

This 2006 post from the internal NSA newsletter SIDToday describes the opening of VICTORYGARDEN, a “state-of-the-art FORNSAT site”: see the Intercept article Norway Used NSA Technology for Potentially Illegal Spying, 1 March 2018.

This February 2010 post from the internal NSA newsletter SIDToday draws attention to voice-masking technology used by subjects of surveillance to frustrate the agency’s voice-recognition efforts: see the Intercept article Finding Your Voice, 19 January 2018.

This 26 October 2007 article in the internal NSA newsletter SIDToday describes the agency’s special collection for then-Iranian President Mahmoud Ahmadinejad’s New York City trip for the United Nations General Assembly and provides a detailed study of the technology in action: see the Intercept article Finding Your Voice, 19 January 2018.

TOP SECRET//COMINT//NOFORN//20320108
Friday, October 26, 2007
(U//FOUO) Tips for a Successful Quick Reaction Capability
by
(U) Collaboration is a way to get the job done.
(TS//SI//NF...

This letters column, published in a 2006 edition of the internal NSA newsletter SIDToday includes one from an analyst who describes the problems with introducing voice recognition technology, which did not function well to begin with: see the Intercept article Finding Your Voice, 19 January 2018.

DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS
TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL
(U) Letters to the Editor: Still More on Tool Development
FROM: the editor
Unknown
...

Slides from an NSA Turbulence presentation describe two of the agency’s specialised implants, aimed at compromising virtual private networks (VPNs) and online telephony (VOIP): see the Intercept article How the NSA Plans to Infect ‘Millions’ of Computers with Malware, 12 March 2014.

This undated page from NSA’s internal WikiInfo describes VALIANTSURF “the coverterm for the development of Data Network Cipher (DNC) exploitation capabilities in TURMOIL”: see the Der Spiegel story Prying Eyes: Inside the NSA’s War on Internet Security, 28 December 2014.

﻿VALIANTSURF - Wikiinfo
The accredited security level of this system is: TOP SECRET//SI-GAMMA/TALENT KEYHOLE//ORCON/PROPIN/RELIDO/REL TO USA, FVEY *
TOP SECRET1/SI/10RCON1REL TO USA, FVEY
...